Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Alteon Switched Firewall Version 2.0.3 with Hotfix 315/NG_FP3_HFA_315
383-4-31
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
CCEVS-VR-VID-10517-2014
name Alteon Switched Firewall Version 2.0.3 with Hotfix 315/NG_FP3_HFA_315 Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
scheme CA US
not_valid_after 28.09.2015 07.05.2016
not_valid_before 12.09.2005 07.03.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AlteonCR_v1_0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NortelASF-ST-1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf
manufacturer Nortel Networks Juniper Networks, Inc.
manufacturer_web https://www.nortel.com/ https://www.juniper.net/
security_level EAL4 {}
dgst e765ae3a15ff884f c99465e61767d10a
heuristics/cert_id 383-4-31 CCEVS-VR-VID-10517-2014
heuristics/cert_lab CANADA US
heuristics/cpe_matches {} cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-21594, CVE-2024-39517, CVE-2022-22215, CVE-2023-44175, CVE-2022-22244, CVE-2023-36839, CVE-2013-6014, CVE-2022-22242, CVE-2024-39511, CVE-2014-2714, CVE-2023-44197, CVE-2022-22214, CVE-2014-3819, CVE-2023-28963, CVE-2023-4481, CVE-2022-22245, CVE-2013-4689, CVE-2022-22173, CVE-2004-0468, CVE-2023-44201, CVE-2023-28975, CVE-2024-30397, CVE-2023-36842, CVE-2022-22246, CVE-2024-21591, CVE-2013-7313, CVE-2023-44182, CVE-2023-28964, CVE-2014-2712, CVE-2023-22391, CVE-2022-22181, CVE-2021-31362, CVE-2023-44177, CVE-2023-44178, CVE-2024-39555, CVE-2022-22243, CVE-2023-22406, CVE-2022-22208, CVE-2023-28979, CVE-2023-36840, CVE-2023-36843, CVE-2024-39514, CVE-2014-3818, CVE-2022-22224, CVE-2022-22197, CVE-2023-44184, CVE-2022-22220, CVE-2023-36841, CVE-2023-44185, CVE-2014-2713, CVE-2019-0036, CVE-2013-4686, CVE-2022-22241, CVE-2024-30380, CVE-2022-22162, CVE-2023-22395, CVE-2024-39558, CVE-2024-39528, CVE-2013-6618, CVE-2023-28962, CVE-2014-2711, CVE-2023-44176, CVE-2024-39556, CVE-2021-31372, CVE-2023-44194, CVE-2022-22238, CVE-2023-44186, CVE-2024-39549, CVE-2014-6379, CVE-2022-22156, CVE-2022-22163, CVE-2014-6380, CVE-2023-22407, CVE-2014-3816
heuristics/extracted_sars ADV_IMP.1, ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.2, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_SPM.1, AVA_MSU.2, ADV_RCR.1, ALC_LCD.1, ATE_FUN.1, ADV_LLD.1, ADV_HLD.2 AGD_OPE.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1
heuristics/extracted_versions 2.0.3 3.5, 12.1
heuristics/protection_profiles {} ac9abe3d5c5a31f0
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/report_filename AlteonCR_v1_0.pdf st_vid10517-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
    • cert_id: 383-4-31
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-VID10517-2014
    • cert_item: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-31: 2
  • US:
    • CCEVS-VR-VID10517-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 5
  • SSH:
    • SSH: 8
    • SSHv2: 3
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-004: 1
  • RFC:
    • RFC 2246: 1
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /Author: cmaugi
  • /CreationDate: D:20050704120617-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20050704120617-04'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - AlteonCR_v1_0.doc
  • pdf_file_size_bytes: 163095
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Leidos
  • /Company: Leidos
  • /CreationDate: D:20140310131529-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20140310131543-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140310171504
  • /Subject: Juniper Junos NDPP
  • /Title: Validation Report
  • /_NewReviewCycle:
  • pdf_file_size_bytes: 119090
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename NortelASF-ST-1.5.pdf st_vid10517-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 59
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_SAA.1: 6
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 22
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 5
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 4
  • FIA:
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
  • FMT:
    • FMT_MOF.1: 24
    • FMT_MOF.1.1: 4
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 33
    • FMT_SMF.1.1: 4
    • FMT_SMR.1: 6
  • FPT:
    • FPT_RVM.1: 6
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
    • FCS_CKM_EXT.4: 10
    • FCS_COP.1: 20
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 6
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 5
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 7
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 7
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 8
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 3
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_EXT_SSL.1: 2
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 2
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDEA: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
    • Key exchange: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
  • VPN:
    • VPN: 55
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 46
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RBG: 2
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/tee_name
  • other:
    • T6: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2004-01-004: 1
  • FIPS:
    • FIPS PUB 180-1: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-2: 4
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 2
  • RFC:
    • RFC 1321: 2
    • RFC 1777: 1
    • RFC 1778: 1
    • RFC 2104: 2
    • RFC 2246: 1
    • RFC 2404: 1
    • RFC 2405: 1
    • RFC 2409: 1
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
    • RFC 2409: 1
    • RFC 2451: 1
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 2
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC2404: 1
    • RFC2406: 1
    • RFC2409: 1
    • RFC2451: 1
    • RFC4253: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these PKI: 1
  • OutOfScope:
    • Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: ggibbs
  • /CreationDate: D:20050606100035-04'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050606100035-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: Microsoft Word - NortelASF-ST-1.5.doc
  • pdf_file_size_bytes: 269881
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: ISL-netbook
  • /CreationDate: D:20140513092401+01'00'
  • /Creator: PDFCreator Version 1.7.2
  • /Keywords:
  • /ModDate: D:20140603093259-04'00'
  • /Producer: GPL Ghostscript 9.10
  • /Subject:
  • /Title: [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
  • pdf_file_size_bytes: 529913
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different